General

  • Target

    2024-09-28_043fa41b7828e9fda3e4b5d66f8a7383_cryptolocker

  • Size

    54KB

  • MD5

    043fa41b7828e9fda3e4b5d66f8a7383

  • SHA1

    f7a37f1d4f06d213d43e3ecae80b8f045fe6d821

  • SHA256

    d9ae3fb72902599a9658edea4c11451b71f59666ba1a2c83f6039bb9fad54e3f

  • SHA512

    96a233dd07dadd09e419f71f5c2c249d163482693cb73791bf0bdda6d1ee20935c424bb1a396b0ca25ba11a1f1e0674bdb7b06eab8e18d4a16de058c79412211

  • SSDEEP

    768:bco/2n1TCraU6GD1P2wZEjbhxnbcuyD7U9kXDn62tH/1/LpPFPt:b7/y28wZEjbnouy8G76iH/NLpH

Score
5/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-09-28_043fa41b7828e9fda3e4b5d66f8a7383_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections